ADVANCES in E-ACTIVITIES, INFORMATION SECURITY and PRIVACY

Size: px
Start display at page:

Download "ADVANCES in E-ACTIVITIES, INFORMATION SECURITY and PRIVACY"

Transcription

1

2 ADVANCES in E-ACTIVITIES, INFORMATION SECURITY and PRIVACY 9th WSEAS International Conference on E-ACTIVITIES (E-ACTIVITIES '10) 9th WSEAS International Conference on INFORMATION SECURITY and PRIVACY (ISP '10) University of Los Andes, Merida Venezuela, December 14-16, 2010 Published by WSEAS Press ISSN E-ACTIVITIES: ISSN ISP: ISBN:

3 ADVANCES in E-ACTIVITIES, INFORMATION SECURITY and PRIVACY 9th WSEAS International Conference on E-ACTIVITIES (E-ACTIVITIES '10) 9th WSEAS International Conference on INFORMATION SECURITY and PRIVACY (ISP '10) University of Los Andes, Merida Venezuela, December 14-16, 2010 Published by WSEAS Press Copyright 2010, by WSEAS Press All the copyright of the present book belongs to the World Scientific and Engineering Academy and Society Press. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the Editor of World Scientific and Engineering Academy and Society Press. All papers of the present volume were peer reviewed by two independent reviewers. Acceptance was granted when both reviewers' recommendations were positive. See also: ISSN E-ACTIVITIES: ISSN ISP: ISBN: World Scientific and Engineering Academy and Society

4 ADVANCES in E-ACTIVITIES, INFORMATION SECURITY and PRIVACY 9th WSEAS International Conference on E-ACTIVITIES (E-ACTIVITIES '10) 9th WSEAS International Conference on INFORMATION SECURITY and PRIVACY (ISP '10) University of Los Andes, Merida Venezuela, December 14-16, 2010

5

6 Editors: Prof. Francklin Rivas-Echeverria, Universidad de Los Andes, Merida, Venezuela Prof. Gloria Mousalli-Kayat, Universidad de Los Andes, Merida, Venezuela International Program Committee Members: Prof. Anna Perez Prof. Jesus Calderon Prof. Oscar Camacho Prof. Luis A. Angulo Prof. Raul Huizzi Prof. Jose Aguilar Prof. Milagro Rivero Prof. Eliezer Colina Prof. Flor Narciso Prof. Addison Rios Prof. Mary Vergara Prof. Carlos Rivas Prof. Sebastian Provenzano Prof. Ana Patete Prof. Andres Arcia

7

8 Preface This year the 9th WSEAS International Conference on E-ACTIVITIES (E-ACTIVITIES '10) and the 9th WSEAS International Conference on INFORMATION SECURITY and PRIVACY (ISP '10) were held at the University of Los Andes, Merida, Venezuela, December 14-16, The conferences remain faithful to their original idea of providing a platform to discuss E- Learning, E-Communities, E-Commerce, E-Management, E-Marketing, E-Governance, passive attacks, active attacks, viruses, Trojan horses, worms, denial of service, information security services etc. with participants from all over the world, both from academia and from industry. Their success is reflected in the papers received, with participants coming from several countries, allowing a real multinational multicultural exchange of experiences and ideas. The accepted papers of these conferences are published in this Book that will be indexed by ISI. Please, check it: as well as in the CD-ROM Proceedings. They will be also available in the E-Library of the WSEAS. The best papers will be also promoted in many Journals for further evaluation. Conferences such as these can only succeed as a team effort, so the Editors want to thank the International Scientific Committee and the Reviewers for their excellent work in reviewing the papers as well as their invaluable input and advice. The Editors

9

10 Advances in E-Activities, Information Security and Privacy Table of Contents Plenary Lecture 1: Information Systems and Artificial Intelligence Applications and Limitations on Medical E-learning and E-Management, a Venezuelan Experience Carlos Rivas-Echeverria Information and Communication Technology Application οn Learning Bahasa Melayu among Foreign Students Maimun Aqsha Lubis, Mohamed Amin Embi, Ismail Suardi Wekke, Kamarulzaman Abdul Ghani, Sabariah Sulaiman Protecting Cookies against Cross-Site Scripting Attacks using Cryptography 22 S. Mohammadi, Farhad Koohbor Polychronicity and Multipresence: A Grounded Theory of E-Learning Timeawareness as Expressed by Portuguese Academics' Time Concepts Jorge Tiago Martins, Miguel Baptista Nunes 32 New Mobile Payment Protocol: Mobile Pay Center Protocol (MPCP) 41 Mohammad Vahid Alizade, Reza Askari Moghaddam, Samad Momenebellah Multi-Layered Collaborative Approach to Address Enterprise Mobile Security Challenges 47 Jithesh Sathyan, Manesh Sadasivan A System and Design of Extensible Authentication Protocols based on ECC and SKE Mechanisms for Mobile and Wireless Communications Natarajan Vijayarangan 53 Risk Management with ISO Standards in Information Security 58 Kaja Prislan, Igor Bernik Regular Expressions Fusion using Emergent Computing 64 Rafael Torres, Junior Altamiranda, Jose Aguilar, Christian Delamarche Implementation of a Open Source Security Software Platform in a Telemedicine Network 72 M. Huerta, T. Viva, R. Clotet, R.Gonzalez, R. Alvizu, A. Perez, D. Rivas, F. Lara y R. Escalante, Ruben Gonzalez A Standard-Compliant Integrated Security Framework 77 Hassen Sallay, Khaled Al-Shalfan Managing Online Communities: An E-Moderation Collaboratively Constructed Paper 85 Teadira Perez, Raymond Marquina E-Banking Systems Implementation and Introduction with Focus on Iranian Banking Transactions Abolfazl Kalanaki 91 Education Blog: Institutional Technological Change Manager 97 Joan F. Chipia Lobo, Francklin Rivas, Gloria Mousalli-Kayat ISBN:

11 Advances in E-Activities, Information Security and Privacy Architecture of an Auto Vaccination System for Handheld Device and the Countermeasures for the Security Threats Maricel O. Balitanas, Tai-Hoon Kim 103 Formal Analysis of Intrusion Detection Systems for High Speed Networks 109 Mohsen Rouached, Hassen Sallay, Ouissem Ben Fredj, Adel Ammar, Khaled Al-Shalfan, Majdi Ben Saad On Distributed Intrusion Detection Systems Design for High Speed Networks 115 Ouissem Ben Fredj, Hassen Sallay, Adel Ammar, Mohsen Rouached, Khaled Al-Shalfan, Majdi Ben Saad Cellular Automata Encryption Method: Description, Evaluation and Tests 121 Lucian Milea, Mihail Teodorescu, Vlad Grosu, Orest Oltu Authors Index 125 ISBN:

12 Advances in E-Activities, Information Security and Privacy Plenary Lecture 1 Information Systems and Artificial Intelligence Applications and Limitations on Medical E-learning and E-Management, a Venezuelan Experience Professor Carlos Rivas-Echeverria Laboratorio de Sistemas Inteligentes, Universidad de Los Andes also with Clinicas del Sueno SLEEPCARE & Fundacion Dra. Yolanda Echeverria Merida, 5101 VENEZUELA Abstract: Information systems and artificial intelligence have plenty applications on the medical field and they are wide and common. Computer support has shown that can improve the quality of general medical care. It can improve the efficiency and optimize the management of the sanitary system and the clinical practice; and can reduce errors. Most countries are using electronic health records for the primary care system and hospitals. Electronic drug prescribing has significantly reduce drug errors. Telemedicine (including robotics) had delivered specialized medicine regardless the distance where the patients or physicians are located. Digital imaging management has facilitated the availability of images throughout the whole healthcare system, dramatically reducing film-developing and other costs while making them immediately available to the practitioner. Informatics management is fundamental to health care delivery. These are just a few examples among several other applications. Our laboratory, in Venezuela, has developed several expert systems and information systems that have been particularly designed for educational purposes; and recently we have developed some that also have applications on management. The plenary session includes the features and applications of the systems as well as their limitations in a developing country like ours. The trends and possible future for these systems are also discussed. Brief Biography of the Speaker: Carlos Rivas-Echeverria, MD, PhD, FACP. Specialist in Internal Medicine and in Critical Care. Has a Master Degree on Sleep Medicine and a Diplomate on Franchising Systems Management. Is the Head of the SLEEPCARE Sleep Clinics. Is Full Professor at the University of Los Andes, Head of the Department of Pharmacology. He is cofounder and active Member of the Intelligent Systems Laboratory. Over 60 publications in high level conferences and journals: the main topics of his papers are: Hypertensive disorders of pregnancy, sleep disorders, traffic accidents and artificial intelligence. ISBN:

13 Advances in E-Activities, Information Security and Privacy Authors Index Aguilar, J. 64 Marquina, R. 85 Alizade, M. V. 41 Milea, L. 121 Al-Shalfan, K. 77, 109, 115 Moghaddam, R. A. 41 Altamiranda, J. 64 Mohammadi, S. 22 Alvizu, R. 72 Momenebellah, S. 41 Ammar, A. 109, 115 Mousalli-Kayat, G. 97 Balitanas, M. O. 103 Oltu, O. 121 Baptista Nunes, M. 32 Perez, A. 72 Ben Fredj, O. 109, 115 Perez, T. 85 Bernik, I. 58 Prislan, K. 58 Chipia Lobo, J. F. 97 Rivas, D. 72 Clotet, R. 72 Rivas, F. 97 Delamarche, C. 64 Rouached, M. 109, 115 Embi, M. A. 13 Saad, M. B. 109, 115 Escalante, F. L. R. 72 Sadasivan, M. 47 Ghani, K. A. 13 Sallay, H. 77, 109, 115 Gonzalez, R. 72 Sathyan, J. 47 Gonzalez, R. 72 Sulaiman, S. 13 Grosu, V. 121 Teodorescu, M. 121 Huerta, M. 72 Tiago Martins, J. 32 Kalanaki, A. 91 Torres, R. 64 Kim, T.-H. 103 Vijayarangan, N. 53 Koohbor, F. 22 Viva, T. 72 Lubis, M. A. 13 Wekke, I. S. 13 ISBN:

Guide to Assessment Scales in Parkinson s Disease

Guide to Assessment Scales in Parkinson s Disease Guide to Assessment Scales in Parkinson s Disease Pablo Martinez-Martin Research Unit, Alzheimer Centre Reina Sofia Foundation and Centre for Networked Biomedical Research on Neurodegenerative Diseases

More information

Information, Network & Cyber Security

Information, Network & Cyber Security School COMSC Information, Network & Cyber Security Information security officers are faced with strategic decisions on a daily basis, and are required to make informed decisions on the security options

More information

Universidad de Los Andes Red Científica Alemania-Latinoamérica Deutscher Akademischer Austauschdienst

Universidad de Los Andes Red Científica Alemania-Latinoamérica Deutscher Akademischer Austauschdienst IV International Workshop Large Latin American Cities: Informality and Poverty in large Latin American Cities, old and new forms and their impacts on the governability Mérida, Venezuela, December 4-6,

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

ehealth: Information and Communication Technology in Health August 29-31, 2016

ehealth: Information and Communication Technology in Health August 29-31, 2016 ehealth: Information and Communication Technology in Health August 29-31, 2016 1. Profile of facilitators Name and title: 1. Martin Raab 2. Prof. Antoine Geissbuhler 3. Gonçalo Castro Current position

More information

Client Virtualization in a Cloud Environment

Client Virtualization in a Cloud Environment by Enrique Castro-Leon, Enterprise & Data Center Architect & Technology Strategist for Intel Corporation, Bernard Golden, CEO of Navica & Miguel Gomez, Technology Specialist for the Networks & Service

More information

Abstract. 1. Introduction

Abstract. 1. Introduction 보안공학연구논문지 Journal of Security Engineering Vol.12, No.2 (2015), pp.181-190 http://dx.doi.org/10.14257/jse.2015.04.07 Abstract E-health is the delivery of health information, for health professionals and

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

International Harmonization of Reporting for Financial Securities

International Harmonization of Reporting for Financial Securities International Harmonization of Reporting for Financial Securities Authors Dr. Jiri Strouhal Dr. Carmen Bonaci Editor Prof. Nikos Mastorakis Published by WSEAS Press www.wseas.org ISBN: 978-1-61804-008-4

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

WHITE PAPER Malicious Code and Mobile Devices: Best Practices for Securing Mobile Environments

WHITE PAPER Malicious Code and Mobile Devices: Best Practices for Securing Mobile Environments Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Malicious Code and Mobile Devices: Best Practices for Securing Mobile Environments Sponsored

More information

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents

More information

Methodologies development and software quality metrics in educational applications

Methodologies development and software quality metrics in educational applications Methodologies development and software quality metrics in educational applications JOAN F. CHIPIA LOBO Maestría en Educación mención Informática y Diseño Instruccional Universidad de Los Andes La Liria,

More information

UVic Department of Electrical and Computer Engineering

UVic Department of Electrical and Computer Engineering UVic Department of Electrical and Computer Engineering COURSE OUTLINE Elec 567 Advanced Network Security and Forensics Spring 2014 Instructor: Office Hours: Dr. Issa Traore Days: Monday, Thursday Phone:

More information

Client Virtualization in a Cloud Environment

Client Virtualization in a Cloud Environment Client Virtualization in a Cloud Environment ABSTRACT: Arguably computation models seen in client space are much more diverse than those in the server space proper. For servers, there are essentially two,

More information

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2015-2016 (C)ITM 820 - Information Systems Security and Privacy

More information

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus COMP-530 Cryptographic Systems Security *Requires Programming Background University of Nicosia, Cyprus Course Code Course Title ECTS Credits COMP-530 Cryptographic Systems 10 Security Department Semester

More information

CCNA Security v1.0 Scope and Sequence

CCNA Security v1.0 Scope and Sequence CCNA Security v1.0 Scope and Sequence Last updated April 7, 2011 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security

More information

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu MS in Computer Science with specialization in Computer Security Prof. Clifford Neuman bcn@isi.edu Computer Security Specialization Computer Security is a hot area of study with a critical need Needed by

More information

ATP Initiatives in Healthcare Informatics

ATP Initiatives in Healthcare Informatics ATP Initiatives in Healthcare Informatics Richard N. Spivack, Ph.D. Economic Assessment Office (tel.) 301-975 975-50635063 (fax) 301-975 975-4776 richard.spivack spivack@nist.gov www.atp atp.nist.gov Advanced

More information

Weighted Total Mark. Weighted Exam Mark

Weighted Total Mark. Weighted Exam Mark CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU

More information

Center for Computer Systems Security

Center for Computer Systems Security Center for Computer Systems Security USC recognized as Center of Academic Excellence in Information Assurance Research By US Department of Homeland Security and the National Security Agency The Center

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

A Study on Secure Electronic Medical DB System in Hospital Environment

A Study on Secure Electronic Medical DB System in Hospital Environment A Study on Secure Electronic Medical DB System in Hospital Environment Yvette E. Gelogo 1 and Sungwon Park 2 * 1 Catholic University of Daegu, Daegu, Korea 2 Department of Nursing, Hannam University, 133

More information

CISCO IOS NETWORK SECURITY (IINS)

CISCO IOS NETWORK SECURITY (IINS) CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.

More information

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,

More information

Rhode Island Board of Medical Licensure and Discipline Guidelines for the Appropriate Use of Telemedicine and the Internet in Medical Practice

Rhode Island Board of Medical Licensure and Discipline Guidelines for the Appropriate Use of Telemedicine and the Internet in Medical Practice Rhode Island Board of Medical Licensure and Discipline Guidelines for the Appropriate Use of Telemedicine and the Internet in Medical Practice Section One: Preamble Telemedicine has a place in the practice

More information

230617 - NS - Network Security

230617 - NS - Network Security Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 230 - ETSETB - Barcelona School of Telecommunications Engineering 744 - ENTEL - Department of Network Engineering DEGREE IN TELECOMMUNICATIONS

More information

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html

More information

Development of a file-sharing system for educational collaboration among higher-education institutions

Development of a file-sharing system for educational collaboration among higher-education institutions Development of a file-sharing system for educational collaboration among higher-education institutions Takuya Matsuhira, Yoshiya Kasahara, and Yoshihiro Takata Abstract Opportunities for educational, research-oriented,

More information

.CRF. Electronic Data Capture and Workflow System for Clinical Trials

.CRF. Electronic Data Capture and Workflow System for Clinical Trials .CRF Electronic Data Capture and Workflow System for Clinical Trials Business challenge Most research takes place in different centers simultaneously. These are often located in different cities or even

More information

Information Assurance and Security Technologies for Risk Assessment and Threat Management:

Information Assurance and Security Technologies for Risk Assessment and Threat Management: Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances Te-Shun Chou East Carolina University, USA Information Science REFERENCE Detailed Table of Contents Foreword

More information

A Multiagent Model for Intelligent Distributed Control Systems

A Multiagent Model for Intelligent Distributed Control Systems A Multiagent Model for Intelligent Distributed Control Systems José Aguilar, Mariela Cerrada, Gloria Mousalli, Franklin Rivas, and Francisco Hidrobo CEMISID, Dpto. de Computación, Facultad de Ingeniería,

More information

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security

More information

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion

More information

Mobile IP Security Issues and Solutions

Mobile IP Security Issues and Solutions Mobile IP Security Issues and Solutions Sameer Chandragiri Dept of Computer Science University of Texas at Arlington CSE 6345 Term Paper samchan@rediffmail.com ABSTRACT In the last few years, the area

More information

PROFESSOR ANÍBAL TRAÇA DE ALMEIDA

PROFESSOR ANÍBAL TRAÇA DE ALMEIDA PROFESSOR ANÍBAL TRAÇA DE ALMEIDA Position: Full Professor Scientific Area: Energy Efficiency in Industry and Buildings; Distributed Generation; Energy Storage Email Adress: adealmeida@isr.uc.pt Instituto

More information

Learning about Technology through Global Healthcare

Learning about Technology through Global Healthcare Kyle Pollock www.meditourexpo.net Learning about Technology through Global Healthcare Global Healthcare is defined as crossing borders for care and requires innovation in ways to communicate with different

More information

New rule sets standards of practice for physicians who use telemedicine

New rule sets standards of practice for physicians who use telemedicine STATE OF IOWA TERRY BRANSTAD, GOVERNOR KIM REYNOLDS, LT. GOVERNOR IOW A BO ARD OF MEDICINE MARK BOW DEN, E XECUTIVE DIRECTO R FOR IMMEDIATE RELEASE: June 3, 2015 CONTACT: Mark Bowden, (515) 242-3268 or

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Board votes to establish standards for physicians who use telemedicine

Board votes to establish standards for physicians who use telemedicine STATE OF IOWA TERRY BRANSTAD, GOVERNOR KIM REYNOLDS, LT. GOVERNOR IOW A BO ARD OF MEDICINE MARK BOW DEN, E XECUTIVE DIRECTO R FOR IMMEDIATE RELEASE: October 10, 2014 CONTACT: Mark Bowden, ( 515) 242-3268

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

The Information Security Problem

The Information Security Problem Chapter 10 Objectives Describe the major concepts and terminology of EC security. Understand phishing and its relationship to financial crimes. Describe the information assurance security principles. Identify

More information

Chap. 1: Introduction

Chap. 1: Introduction Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed

More information

Theme 1: IT Governance and Audit Methodologies

Theme 1: IT Governance and Audit Methodologies Theme 1: IT Governance and Audit Methodologies Recent rapid development of new IT technologies was followed up by an instantaneous integration of them at the organizational level. The management of the

More information

Network Security. Chapter 1 Introduction. Network Security IN2101. Georg Carle. Course organization

Network Security. Chapter 1 Introduction. Network Security IN2101. Georg Carle. Course organization Chair for Network Architectures and Services Institute for Informatics TU München Prof. Carle Network Security IN101 Prof. Dr.-Ing. Georg Carle Dipl.-Inform. Ali Fessi Institut für Informatik Technische

More information

Cellular Wireless technology: Creating a link between people and the healthcare community

Cellular Wireless technology: Creating a link between people and the healthcare community Cellular Wireless technology: Creating a link between people and the healthcare community Introduction Demands on health-care systems worldwide have increased to the point where the delivery and cost of

More information

A Systems Engineering Approach to Developing Cyber Security Professionals

A Systems Engineering Approach to Developing Cyber Security Professionals A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.

More information

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport

More information

1. Introduction to ehealth:

1. Introduction to ehealth: 1. Introduction to ehealth: E-Health is one of the fastest growing areas within the health sector. The scope of e- Health involves application of the knowledge, skills and tools, which enable information

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure

More information

Seamless ICT Infrastructure Security.

Seamless ICT Infrastructure Security. Seamless ICT Infrastructure Security. Integrated solutions from a single source. Effective protection requires comprehensive measures. Global networking has practically removed all borders in the exchange

More information

Australian Standard. Health informatics Public key infrastructure. Part 2: Certificate profile AS ISO ISO/TS :2002 AS ISO

Australian Standard. Health informatics Public key infrastructure. Part 2: Certificate profile AS ISO ISO/TS :2002 AS ISO AS ISO 17090.2 2003 ISO/TS 17090-2:2002 AS ISO 17090.2 Australian Standard Health informatics Public key infrastructure Part 2: Certificate profile This Australian Standard was prepared by Committee IT-014,

More information

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶 Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course

More information

A Cyber Security Integrator s perspective and approach

A Cyber Security Integrator s perspective and approach A Cyber Security Integrator s perspective and approach Presentation to Saudi Arabian Monetary Agency March 2014 What is a Cyber Integrator? Security system requirements - Finance Building a specific response

More information

CCNA Security v1.0 Scope and Sequence

CCNA Security v1.0 Scope and Sequence CCNA Security v1.0 Scope and Sequence Last updated June 18, 2009 Note: The English version of this course is scheduled to be generally available in July 2009. Target Audience The Cisco CCNA Security course

More information

T.V. SERVICE, INC., dba TVS CABLE MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION

T.V. SERVICE, INC., dba TVS CABLE MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION T.V. SERVICE, INC., dba TVS CABLE MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION The following policies apply to mass market broadband Internet services offered by T.V. Service, Inc., doing

More information

FACULTY OF ECONOMICS AND MANAGEMENT PROGRAMME ADMISSION QUALIFICATION LIST OF COURSES

FACULTY OF ECONOMICS AND MANAGEMENT PROGRAMME ADMISSION QUALIFICATION LIST OF COURSES FACULTY OF ECONOMICS AND MANAGEMENT PROGRAMME ADMISSION QUALIFICATION LIST OF COURSES Accounting 6 Semesters Kuala Lumpur Islamic Economy Possess Bachelor Degree of Accounting with a high cumulative grade

More information

CLINICAL PHARMACOLOGY

CLINICAL PHARMACOLOGY 0 :: 2 v01 x y p.345 B xxx.:: B A x y pval«««[xy] -løøøø xxx.:: øøøø -0.02-0.01-0.00 0.00 0.01 0.02.1.2 A PHARMATRAIN CENTRE OF EXCELLENCE EXPLORATORY & CONFIRMATORY CLINICAL DEVELOPMENT: CLINICAL PHARMACOLOGY

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 1 Introduction

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 1 Introduction Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 1 Introduction Questions Who is studying? Bachelor Informatics? / Information Sciences

More information

Deploying a Secure Wireless VoIP Solution in Healthcare

Deploying a Secure Wireless VoIP Solution in Healthcare Deploying a Secure Wireless VoIP Solution in Healthcare Situation Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants

More information

HIT Workflow & Redesign Specialist: Curriculum Overview

HIT Workflow & Redesign Specialist: Curriculum Overview HIT Workflow & Redesign Specialist: Curriculum Overview Component - Description Units - Description Appx. Time 1: Introduction to Health Care and Public Health in the U.S. Survey of how healthcare and

More information

The FBI and the Internet

The FBI and the Internet The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The

More information

HIPAA Compliance and Wireless Networks

HIPAA Compliance and Wireless Networks HIPAA Compliance and Wireless Networks White Paper 2004 Cranite Systems, Inc. All Rights Reserved. All materials contained in this document are the copyrighted property of Cranite Systems, Inc. and/or

More information

T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes

T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information

More information

Licensed Healthcare Providers Guidelines for Telemedicine Using the MyDocNow Platform

Licensed Healthcare Providers Guidelines for Telemedicine Using the MyDocNow Platform Contents 1. Scope of These Guidelines... 2 2. What is Telemedicine?... 2 3. Introduction... 3 4. What Are the Benefits of Telemedicine?... 3 5. Frequently Asked Questions Physician Care and Treatment...

More information

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

Cablelynx Acceptable Use Policy

Cablelynx Acceptable Use Policy Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing

More information

MED 2400 MEDICAL INFORMATICS FUNDAMENTALS

MED 2400 MEDICAL INFORMATICS FUNDAMENTALS MED 2400 MEDICAL INFORMATICS FUNDAMENTALS NEW YORK CITY COLLEGE OF TECHNOLOGY The City University Of New York School of Arts and Sciences Biological Sciences Department Course title: Course code: MED 2400

More information

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS COURSE PROFILE Course Name Code Semester Term Theory+PS+Lab (hour/week) Local Credits ECTS Network Security IT527 Fall 3 + 0 + 0 3 8 Prerequisites None Course Language Course Type Course Lecturer Course

More information

CEH Version8 Course Outline

CEH Version8 Course Outline CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information

More information

Course Outline Computing Science Department Faculty of Science. COMP 3260 3 Credits Computer Network Security (3,1,0) Fall 2015

Course Outline Computing Science Department Faculty of Science. COMP 3260 3 Credits Computer Network Security (3,1,0) Fall 2015 Course Outline Computing Science Department Faculty of Science COMP 30 3 Credits Computer Network Security (3,,0) Fall 05 Instructor: E-Mail: Phone/Voice Mail: Office: Office Hours: CALENDAR DESCRIPTION

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

Title: Semantic Cyber Security for Semantic Intelligent (SCADA/DCS): Application in modern gas industry

Title: Semantic Cyber Security for Semantic Intelligent (SCADA/DCS): Application in modern gas industry Title: Semantic Cyber Security for Semantic Intelligent (SCADA/DCS): Application in modern gas industry Authors: Sahli Nabil 1, BenMohammed Mohamed 2, El-Bay Bourennane 3 1 GRTG Factory SONELGAZ Group,

More information

ss. Cyril and Methodius University Faculty of Computer Science and Engineering Skopje, Macedonia

ss. Cyril and Methodius University Faculty of Computer Science and Engineering Skopje, Macedonia ss. Cyril and Methodius University Faculty of Computer Science and Engineering Skopje, Macedonia Prof. Dimitar Trajanov, THE UNIVERSITY Ss. Cyril and Methodius University in Skopje is oldest and the biggest

More information

Security aspects of e-tailing. Chapter 7

Security aspects of e-tailing. Chapter 7 Security aspects of e-tailing Chapter 7 1 Learning Objectives Understand the general concerns of customers concerning security Understand what e-tailers can do to address these concerns 2 Players in e-tailing

More information

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator POLICIES AND PROCEDURES NEW JERSEY EARLY INTERVENTION SYSTEM No: NJEIS-17 Subject: Computers & Electronic Records Effective Date: May 1, 2011 Responsible Party: Part C Coordinator I. Purpose To protect

More information

www.ehealth.acrrm.org.au ACRRM TeleHealth Advisory Committee Standards Framework

www.ehealth.acrrm.org.au ACRRM TeleHealth Advisory Committee Standards Framework www.ehealth.acrrm.org.au ACRRM TeleHealth Advisory Committee Standards Framework ATHAC 1 Telehealth Standards Framework Purpose The purpose of the ATHAC Telehealth Standards Framework is to provide health

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Discover Viterbi: Cyber Security Engineering & Informatics Programs

Discover Viterbi: Cyber Security Engineering & Informatics Programs Discover Viterbi: Cyber Security Engineering & Informatics Programs Professor Cyrus Shahabi Professor Clifford Neuman Meghan Balding Graduate & Professional Programs November 11, 2015 WebEx Quick Facts

More information

NETWORK ADMINISTRATION AND SECURITY

NETWORK ADMINISTRATION AND SECURITY NETWORK ADMINISTRATION AND SECURITY Unit I (NAS) (W- 10) Q. 1) What is Security Attack? Explain general categories of attack with examples. 7 Q. 2) List and define the five security services. 5 Q. 3) Define

More information

Perspectives in Business Informatics Research

Perspectives in Business Informatics Research Bernd Viehweger (ed.) Perspectives in Business Informatics Research Proceedings of the BIR-2003 Conference September 18-20, 2003 Berlin, Germany Committees Organizing Committee Bernd Viehweger, University

More information

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for

More information

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security

More information

Education Blog: Institutional Technological Change Manager

Education Blog: Institutional Technological Change Manager Education Blog: Institutional Technological Change Manager JOAN F. CHIPIA LOBO Maestría en Educación mención Informática y Diseño Instruccional Universidad de Los Andes La Liria, Mérida 5101 VENEZUELA

More information

Principles of ICT Systems and Data Security

Principles of ICT Systems and Data Security Unit 14: Principles of ICT Systems and Data Security Unit code: L/601/3508 QCF Level 2: BTEC Specialist Credit value: 6 Guided learning hours: 45 Aim and purpose This unit introduces the common types of

More information

Web Application Report

Web Application Report Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012

More information

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun CSCI 454/554 Computer and Network Security Instructor: Dr. Kun Sun About Instructor Dr. Kun Sun, Assistant Professor of Computer Science http://www.cs.wm.edu/~ksun/ Phone: (757) 221-3457 Email: ksun@wm.edu

More information

Jeanne Schreurs, Rachel Moreau

Jeanne Schreurs, Rachel Moreau 110 Assessments 1) Parameters used for determining TIME and SIZE are sufficient for researching information security of objects and computer systems and networks for consumer, not governmental (corporate)

More information

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering Sixth Semester Subject: Network Security & Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents

More information

Payment Card Industry Data Security Standard PCI-DSS #SA7D, Platform Database, Tuning & Security

Payment Card Industry Data Security Standard PCI-DSS #SA7D, Platform Database, Tuning & Security Payment Card Industry Data Security Standard PCI-DSS #SA7D, Platform Database, Tuning & Security John Mason Slides & Code - labs.fusionlink.com Blog - www.codfusion.com What is PCI-DSS? Created by the

More information

SecureAge SecureDs Data Breach Prevention Solution

SecureAge SecureDs Data Breach Prevention Solution SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal

More information

E-Business, E-Commerce

E-Business, E-Commerce E-Business, E-Commerce Lecture Outline 11 Instructor: Kevin Robertson Introduction to Information Systems Explain the differences between extranets and intranets as well as show how organizations utilize

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Computer Networks & Computer Security

Computer Networks & Computer Security Computer Networks & Computer Security Software Engineering 4C03 Project Report Hackers: Detection and Prevention Prof.: Dr. Kartik Krishnan Due Date: March 29 th, 2004 Modified: April 7 th, 2004 Std Name:

More information

Preface. Book Origin and Overview

Preface. Book Origin and Overview Preface The field of wireless sensor networks continues to evolve and grow in both practical and research domains. More and more wireless sensor networks are being used to gather information in real life

More information